Operations | Monitoring | ITSM | DevOps | Cloud

SolarWinds

3 IoT Protocols to Watch in 2020

As we roll into the next decade and IoT becomes commonplace in most organizations, requirements for connectivity will change. Over the last decade of Wi-Fi, we’ve seen a push for faster speeds (high throughput and very high throughput) and recently the ability for greater capacity (high efficiency). Wireless IoT protocols have a different focus. Those requirements are long distance, low power, and flexible architecture. As we consider the next generation, which capabilities rise to the top?

Best Practices for Effective Website Transaction Alerting

Having their websites constantly perform at their optimal capacity should be the aim of all businesses and website owners. When websites go down, load slowly, or underperform, the user experience suffers. This can result in low sales and conversions. So what can you do to ensure your website remains fully functional? In this article, we’ll look at the importance of monitoring your website with a powerful monitoring tool like Pingdom®.

5 Best Heroku Add-Ons in 2020

The cloud provides a standardized approach to embracing disruptive technologies with higher agility and ease of operations. This is why most organizations have embraced cloud-based infrastructure and services for application development and delivery. However, the processes, tools, and platforms used in the application development life cycle are always evolving, allowing businesses to make the most of their cloud investments.

IoT Architecture: 3 Things Every IT Professional Should Know

OK, folks. Let’s be real for a moment and acknowledge that everybody, every professional, and definitely every vendor out there is tossing out the phrase “IoT” like flyers on the Las Vegas strip. As an industry, we tend to use IoT to describe a breadth of networked devices, most often headless—those without a user attached—such as cameras, door entry systems, and HVAC controls.

IT Risk Assessment vs. IT Risk Management: The Difference and What They Mean to the Service Desk

In life, risks can be perceived both negatively and positively. Taking a risk can sometimes yield great results, but other times, a risk is a yellow light of caution. For businesses in particular, if not managed properly, IT risks like malware malfunctions and employee errors can range in size and occur in several areas. The result is disruption and valuable time being used to resolve the issue. But even with risk present, there are measures IT can put in place to ward them off.

How to Monitor for Unauthorized Changes to Your Linux Packages With SCM

Packages keep your Linux servers up to date and running smoothly. Yet if someone tampers with the packages getting deployed to your server, you could have serious performance issues, expose your organization to harmful viruses, or open it up a new vulnerability. Keeping an eye out for what packages are deployed, the package sources, and how they're changed could help prevent or alert you to an issue. In this video, we'll show you how to gain visibility into your Linux packages and track how they're changing over time.

Improving Cybersecurity Starts at the Endpoints

Careful monitoring and attention to endpoints are just two elements of a strong cybersecurity strategy for K-12 districts. Cybersecurity must be a top priority for K-12 schools. Schools need to prioritize thwarting industrious hackers who are intent on getting to the treasure trove of information and personally identifiable information (PII) schools manage.

The Rise of the Machines: ITOM Meets Automation

I started in the IT industry in networking. I had a negative experience in high school trying to learn computer programming*, so I was relieved route/switch had much less to do with computer programming. With the rise of the machines, this isn’t the case anymore. Now in addition to learning router or switch operating systems, routing protocols, and overlay technologies, today’s savvy network engineer needs to throw in things like Python, Ansible, and Jinja.